|
Plagegeister aller Art und deren Bekämpfung: Trojanisches Pferd "TR/Dldr.Baido"Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
15.09.2006, 07:31 | #1 |
| Trojanisches Pferd "TR/Dldr.Baido" Hallo Forum! Vorab, ich bin absolut unwissend, was Viren, Trojaner und sonstiges angeht. Ich arbeite zur Zeit in einem kleinen Buero in Peking, und habe laut Antivir das Trojanische Pferd "TR/Dldr.Baido" auf dem Rechner. Die Dateien, die Antivir als Quelle angibt, liegen unter C:\WINDOWS\system32 und heissen cns.dll, cns.exe, cns.dat. Antivir loescht die Dateien zwar, sie sind bei naechsten Aufruf vom Ordner system32 aber gleich wieder da und werden erneut als Viren erkannt. Ich habe darauf hin mal gegoogelt, anscheinend hat das was mit einem "3721 Assistant Program" von Yahoo zu tun, das lateinische Buchstaben in chinesische Characters umwandelt, allerdings bin ich aus der ganzen Computer-Fachsprache nicht schlau geworden. Ich habe versucht, verschiedene Entfernungs-Anleitungen zu befolgen, die ich im Netz gefunden habe, war aber nicht erfolgreich. Vielleicht ist jemand diesem Trojaner auch schon begegnet und war erfolgreicher..??? Fuer Hilfe waer ich sehr dankbar... Hanna |
15.09.2006, 08:09 | #2 |
> MalwareDB | Trojanisches Pferd "TR/Dldr.Baido" Hallo,
__________________gewerblich genutzte Pcs erfahren hier keinen Support, kontaktiere hier den/die AdminIn. Gruß Schrulli
__________________ |
15.09.2006, 08:16 | #3 |
| Trojanisches Pferd "TR/Dldr.Baido" Hallo,
__________________Ich hab mir den Virus auf meinen eigenen Laptop gezogen, als ich den Internet-Zugang genutzt habe. Ich dachte, es ist relevant, dass sich mein Rechner in China infiziert hat.. |
15.09.2006, 08:21 | #4 |
> MalwareDB | Trojanisches Pferd "TR/Dldr.Baido" Hallo, habe ich so nicht verstanden, lesen können. Installiere Dir ConterSpy, wie hier beschrieben und poste dannach das Log, zusammen mit einem HijackThis Log, Anleitung hier. Gruß Schrulli
__________________ If every computer is running a diverse ecosystem, crackers will have no choice but to resort to small-scale, targetted attacks, and the days of mass-market malware will be over[...]. Stuart Udall |
18.09.2006, 01:49 | #5 |
| Trojanisches Pferd "TR/Dldr.Baido" hallo schrulli, danke fuer die hilfe.. das log von counterspy ist aber anscheinend zu lang Spyware Scan Details Start Date: 9/15/2006 3:54:30 PM End Date: 9/15/2006 4:34:12 PM Total Time: 39 mins 42 secs Detected spyware 3721 Chinese Keywords (CNSMin) Browser Plug-in more information... Details: 3721 Chinese Keywords, also known as CNSMin or Adware.CDN, is keyword-lookup provider that takes over the search feature of IE's address bar. It is aimed at providing keywords using Chinese characters. Status: Ignored Infected files detected c:\WINDOWS\Downloaded Program Files\CnsMin.dll c:\WINDOWS\Downloaded Program Files\CnsMinIO.dll c:\WINDOWS\Downloaded Program Files\cnsio.dll c:\WINDOWS\Downloaded Program Files\CnsHook.dll c:\windows\system32\cns.dll c:\windows\system32\cns.exe c:\windows\system32\drivers\cnsminkp.sys c:\windows\downloaded program files\keepmain.dll c:\windows\downloaded program files\sms.ico c:\windows\downloaded program files\taobao.ico c:\windows\system32\cns.dat C:\WINDOWS\Downloaded Program Files\zsmod.dll C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\AJ2K4QH2\CnsMinUpM[1].cab C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\AJ2K4QH2\CnsMinExM[1].cab C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\8L6BOXMV\cnsdtu[1].cab C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132505.dll C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132507.dll C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132510.dll C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132511.dll C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132512.dll C:\System Volume Information\_restore{6675A66F-0537-4D22-BC25-47AC5050B295}\RP554\A0132516.dll Infected registry entries detected HKEY_CLASSES_ROOT\cnsminhk.cnshook.1 HKEY_CLASSES_ROOT\cnsminhk.cnshook.1\CLSID {D157330A-9EF3-49F8-9A67-4141AC41ADD4} HKEY_CLASSES_ROOT\cnsminhk.cnshook.1 CnsHook Class HKEY_CLASSES_ROOT\cnsminhk.cnshook HKEY_CLASSES_ROOT\cnsminhk.cnshook\CLSID {D157330A-9EF3-49F8-9A67-4141AC41ADD4} HKEY_CLASSES_ROOT\cnsminhk.cnshook\CurVer CnsMinHK.CnsHook.1 HKEY_CLASSES_ROOT\cnsminhk.cnshook CnsHook Class HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\{1b0e7716-898e-48cc-9690-4e338e8de1d3} HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\{1b0e7716-898e-48cc-9690-4e338e8de1d3} SlowInfoCache HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\{1b0e7716-898e-48cc-9690-4e338e8de1d3} Changed 0 HKEY_CURRENT_USER\software\3721 HKEY_CURRENT_USER\software\3721\AutoLive NoShowWarning 1 HKEY_LOCAL_MACHINE\software\3721 HKEY_LOCAL_MACHINE\software\3721\Assist\Modules scrblock.dll 10000-10500,0-0, ,0-0,C:\PROGRA~1\3721\scrblock.dll, HKEY_LOCAL_MACHINE\software\3721\AutoLive\scrblock enable 0 HKEY_LOCAL_MACHINE\software\3721\AutoLive\scrblock notify 1 HKEY_LOCAL_MACHINE\software\3721\AutoLive\scrblock ScrBlockClosed 0 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns01.dat 1.0.2.8 HKEY_LOCAL_MACHINE\software\3721\AutoLive Helper.dll 1.0.9.1324 HKEY_LOCAL_MACHINE\software\3721\AutoLive Notifier.dll 1.0.0.4 HKEY_LOCAL_MACHINE\software\3721\AutoLive ScrBlock.dll 1.0.1.1000 HKEY_LOCAL_MACHINE\software\3721\AutoLive path C:\PROGRA~1\3721\ HKEY_LOCAL_MACHINE\software\3721\AutoLive alini http://download.3721.com/download/autolive.ini HKEY_LOCAL_MACHINE\software\3721\AutoLive altimei 12 HKEY_LOCAL_MACHINE\software\3721\AutoLive alinisw http://download.3721.com/download/autolvsw.ini HKEY_LOCAL_MACHINE\software\3721\AutoLive altimeisw 96 HKEY_LOCAL_MACHINE\software\3721\AutoLive autolive.dll 1.1.5.1324 HKEY_LOCAL_MACHINE\software\3721\AutoLive allasttime 1134977178 HKEY_LOCAL_MACHINE\software\3721\AutoLive NoNewUser 1 HKEY_LOCAL_MACHINE\software\3721\AutoLive autolive.dll_NEW 1.1.0.1021 HKEY_LOCAL_MACHINE\software\3721\AutoLive helper.dll_NEW 1.0.8.1014 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns01.dat_NEW 1.0.2.7 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch03.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch05.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch06.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns01.dat_UPD 1.0.2.7 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch03.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch03.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch05.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch05.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch06.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch06.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive allasttimesw 1134977178 HKEY_LOCAL_MACHINE\software\3721\AutoLive autolive.dll_UPD 1.1.2.1023 HKEY_LOCAL_MACHINE\software\3721\AutoLive helper.dll_UPD 1.0.8.1014 HKEY_LOCAL_MACHINE\software\3721\AutoLive notifier.dll_NEW 1.0.0.3 HKEY_LOCAL_MACHINE\software\3721\AutoLive scrblock.dll_NEW 1.0.1.1000 HKEY_LOCAL_MACHINE\software\3721\AutoLive notifier.dll_UPD 1.0.0.4 HKEY_LOCAL_MACHINE\software\3721\AutoLive alrex.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive alrex.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive alrex.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch09.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch09.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch09.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch10.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch10.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch10.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive scrblock.dll_UPD 1.0.1.1000 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch11.dll_NEW 1.0.0.4 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch11.dll 1.0.0.4 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch11.dll_UPD 1.0.0.4 HKEY_LOCAL_MACHINE\software\3721\AutoLive alliveex.dll_NEW 1.0.2.1005 HKEY_LOCAL_MACHINE\software\3721\AutoLive alliveex.dll 1.0.2.1005 HKEY_LOCAL_MACHINE\software\3721\AutoLive alliveex.dll_UPD 1.0.2.1005 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns03.dat_NEW 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns03.dat 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721\AutoLive cns03.dat_UPD 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721\AutoLive zsmod.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive zsmod.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive zsmod.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch18.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch18.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch18.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch16.dll_NEW 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch16.dll 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch16.dll_UPD 1.0.0.1 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch21.dll_NEW 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch21.dll 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721\AutoLive patch21.dll_UPD 1.0.2.1002 HKEY_LOCAL_MACHINE\software\3721 alhelper C:\PROGRA~1\3721\helper.dll HKEY_LOCAL_MACHINE\software\3721 CFile C:\PROGRA~1\3721\cns01.dat HKEY_LOCAL_MACHINE\software\3721 alpath C:\PROGRA~1\3721\autolive.dll HKEY_LOCAL_MACHINE\software\3721 CFile2 C:\PROGRA~1\3721\cns03.dat HKEY_LOCAL_MACHINE\software\3721 alliveex C:\PROGRA~1\3721\alliveex.dll HKEY_CLASSES_ROOT\TypeLib\{F9AD9D67-EFA8-480E-8291-0163F3960DE7} HKEY_CLASSES_ROOT\TypeLib\{F9AD9D67-EFA8-480E-8291-0163F3960DE7}\1.0\0\win32 C:\PROGRA~1\3721\notifier.dll HKEY_CLASSES_ROOT\TypeLib\{F9AD9D67-EFA8-480E-8291-0163F3960DE7}\1.0\FLAGS 0 HKEY_CLASSES_ROOT\TypeLib\{F9AD9D67-EFA8-480E-8291-0163F3960DE7}\1.0\HELPDIR C:\PROGRA~1\3721 HKEY_CLASSES_ROOT\TypeLib\{F9AD9D67-EFA8-480E-8291-0163F3960DE7}\1.0 NTFObj 1.0 Type Library HKEY_CLASSES_ROOT\TypeLib\{F97E75A4-0103-4F27-A752-327B600B1130} HKEY_CLASSES_ROOT\TypeLib\{F97E75A4-0103-4F27-A752-327B600B1130}\1.0\0\win32 C:\PROGRA~1\3721\Assist\asnoad.dll HKEY_CLASSES_ROOT\TypeLib\{F97E75A4-0103-4F27-A752-327B600B1130}\1.0\FLAGS 0 HKEY_CLASSES_ROOT\TypeLib\{F97E75A4-0103-4F27-A752-327B600B1130}\1.0\HELPDIR C:\PROGRA~1\3721\Assist HKEY_CLASSES_ROOT\TypeLib\{F97E75A4-0103-4F27-A752-327B600B1130}\1.0 ADKiller 1.0 Type Library HKEY_CLASSES_ROOT\TypeLib\{7354662F-CAA3-448B-BC01-04F55A2DCA35} HKEY_CLASSES_ROOT\TypeLib\{7354662F-CAA3-448B-BC01-04F55A2DCA35}\1.0\0\win32 C:\PROGRA~1\3721\Assist\eheocx.dll HKEY_CLASSES_ROOT\TypeLib\{7354662F-CAA3-448B-BC01-04F55A2DCA35}\1.0\FLAGS 0 HKEY_CLASSES_ROOT\TypeLib\{7354662F-CAA3-448B-BC01-04F55A2DCA35}\1.0\HELPDIR C:\PROGRA~1\3721\Assist\ HKEY_CLASSES_ROOT\TypeLib\{7354662F-CAA3-448B-BC01-04F55A2DCA35}\1.0 FFlash 1.0 Type Library HKEY_CLASSES_ROOT\TypeLib\{4158DB95-DE71-41FF-BEA1-2C3D1C679DF1} HKEY_CLASSES_ROOT\TypeLib\{4158DB95-DE71-41FF-BEA1-2C3D1C679DF1}\1.0\0\win32 C:\PROGRA~1\3721\autolive.dll HKEY_CLASSES_ROOT\TypeLib\{4158DB95-DE71-41FF-BEA1-2C3D1C679DF1}\1.0\FLAGS 0 HKEY_CLASSES_ROOT\TypeLib\{4158DB95-DE71-41FF-BEA1-2C3D1C679DF1}\1.0\HELPDIR C:\PROGRA~1\3721 HKEY_CLASSES_ROOT\TypeLib\{4158DB95-DE71-41FF-BEA1-2C3D1C679DF1}\1.0 AutoLive 1.0 Type Library HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C} HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C}\TypeLib {F97E75A4-0103-4F27-A752-327B600B1130} HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{172862CD-9D35-40E7-BAF2-BA7ECF043B9C} IADKillerObj HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08} HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08}\TypeLib {F9AD9D67-EFA8-480E-8291-0163F3960DE7} HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{48E688C8-609F-4B08-944E-3C7FAB99CD08} IAxObj HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050} HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib {D4839331-534D-4D0C-875F-D25AF6A10CCC} HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{7436DB12-1A7A-4D87-A4E0-713EC9D86050} IToolBandObj HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667} HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667}\TypeLib {58E9B715-3C97-4048-9CBE-A708E0AEB29E} HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{924F5B3A-7A27-484A-B873-E855C9708667} IEasyAssist HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E} HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E}\TypeLib {4158DB95-DE71-41FF-BEA1-2C3D1C679DF1} HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{BE08F6BC-C3E6-4149-BEB1-CB449E1B372E} ILive HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC} HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC}\TypeLib {7354662F-CAA3-448B-BC01-04F55A2DCA35} HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{C3A9F7F8-8862-496A-B8A4-25D4140B7DBC} IFlashObjectInterface HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {00000000-0000-0001-0001-596BAEDD1289} HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {59BC54A2-56B3-44a0-93E5-432D58746E26} HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {507F9113-CD77-4866-BA92-0E86DA3D0B97} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} CLSID {1FBA04EE-3024-11d2-8F1F-0000F87ABD16} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} ButtonText E bazar HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} HotIcon C:\WINDOWS\downlo~1\taobao.ico HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} Icon C:\WINDOWS\downlo~1\taobao.ico HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} Default Visible yes HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{59BC54A2-56B3-44a0-93E5-432D58746E26} Exec http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=taobao HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface\CLSID {9EB2B422-C9EE-46C4-A471-1E79C7517B1D} HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface\CurVer FFlash.FlashObjectInterface.1 HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface FlashObjectInterface Class HKEY_CLASSES_ROOT\AutoLive.Live HKEY_CLASSES_ROOT\AutoLive.Live\CLSID {7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2} HKEY_CLASSES_ROOT\AutoLive.Live\CurVer AutoLive.Live.1 HKEY_CLASSES_ROOT\AutoLive.Live Live Class HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {FD00D911-7529-4084-9946-A29F1BDF4FE5} HKEY_CLASSES_ROOT\AutoLive.Live.1 HKEY_CLASSES_ROOT\AutoLive.Live.1\CLSID {7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2} HKEY_CLASSES_ROOT\AutoLive.Live.1 Live Class HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface.1 HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface.1\CLSID {9EB2B422-C9EE-46C4-A471-1E79C7517B1D} HKEY_CLASSES_ROOT\FFlash.FlashObjectInterface.1 FlashObjectInterface Class HKEY_CLASSES_ROOT\clsid\{7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2} HKEY_CLASSES_ROOT\clsid\{7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2}\InprocServer32 C:\PROGRA~1\3721\autolive.dll HKEY_CLASSES_ROOT\clsid\{7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\clsid\{7CA83CF1-3AEA-42D0-A4E3-1594FC6E48B2} AutoLive HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {5D73EE86-05F1-49ed-B850-E423120EC338} HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping {ECF2E268-F28C-48d2-9AB7-8F69C11CCB71} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} CLSID {1FBA04EE-3024-11d2-8F1F-0000F87ABD16} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} ButtonText Yahoo 1G mail HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} HotIcon C:\WINDOWS\downlo~1\ymail.ico HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} Icon C:\WINDOWS\downlo~1\ymail.ico HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} Default Visible yes HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{507F9113-CD77-4866-BA92-0E86DA3D0B97} Exec http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=yahoomail HKEY_CLASSES_ROOT\clsid\{ABEC6103-F6AC-43A3-834F-FB03FBA339A2} HKEY_CLASSES_ROOT\clsid\{ABEC6103-F6AC-43A3-834F-FB03FBA339A2}\InprocServer32 C:\PROGRA~1\3721\notifier.dll HKEY_CLASSES_ROOT\clsid\{ABEC6103-F6AC-43A3-834F-FB03FBA339A2}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\clsid\{ABEC6103-F6AC-43A3-834F-FB03FBA339A2} NtfObj HKEY_CLASSES_ROOT\CLSID\{33BBE430-0E42-4f12-B075-8D21ACB10DCB} HKEY_CLASSES_ROOT\CLSID\{33BBE430-0E42-4f12-B075-8D21ACB10DCB}\InprocServer32 C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\yphtb.dll HKEY_CLASSES_ROOT\CLSID\{33BBE430-0E42-4f12-B075-8D21ACB10DCB}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\CLSID\{33BBE430-0E42-4f12-B075-8D21ACB10DCB} Yahoo!Photo HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main Search Bar http://seek.3721.com/srchasst.htm EGroup Sex Dialer Porn Dialer more information... Details: EGroup Sex Dialer is a program that changes your modem's dial-up settings and attempts to connect to a premium or international phone number to access adult material. Status: Ignored Infected files detected c:\program files\instant access\multi\exe\20050801120856\common\show_module.php c:\program files\instant access\multi\exe\20050801120856\img\dialer.ico c:\program files\instant access\multi\exe\20050801120856\dialerexe.ini c:\program files\instant access\desktopicons\hotel heiress.lnk c:\program files\instant access\center\hotel heiress.lnk Infected registry entries detected HKEY_CURRENT_USER\software\egdhtml HKEY_CURRENT_USER\software\egdhtml ExeStartFile C:\Program Files\Instant Access\Multi\Exe\20050801120856\Common\show_module.php Claria.GAIN.CommonElements Adware (General) more information... Details: Claria's GAIN network consists of several applications inlcuding Gator eWallet, GotSmiley, ScreenSeenes, WebSecureAlert, DashBar, Weatherscope, Date Manager and Precision Time. Status: Ignored |
18.09.2006, 01:50 | #6 |
| Trojanisches Pferd "TR/Dldr.Baido" fortsetzung counterspy log: Infected registry entries detected HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} GEF 64 HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} uets HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} GMG 923D6AE5-0810-4F5C-B555-C849EDB9B805 HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} GMI128 HKEY_CLASSES_ROOT\clsid\{21ffb6c0-0da1-11d5-a9d5-00500413153c} GMI 569683108 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-200 1 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-bytes 46 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-206 456 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-bytes 3714087 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GUS HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GUS _BWHist HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-200 1 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-bytes 46 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-206 456 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-bytes 3714087 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts 212-200 3 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts 212-bytes 0 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GUS _BWHist HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn PdpFirstStart 841:NEW HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat Guid 923D6AE5-0810-4F5C-B555-C849EDB9B805 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat MID128 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat MID 569683108 HKEY_LOCAL_MACHINE\software\gator.com HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_gi StartTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_gi OldestTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_gi 212-200 1 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_gi 212-bytes 46 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_trickle StartTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_trickle OldestTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_trickle 212-206 456 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_trickle 212-bytes 3714087 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_ts StartTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_ts OldestTime 212 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_ts 212-200 3 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GCH\_ts 212-bytes 0 HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn\GUS _BWHist HKEY_LOCAL_MACHINE\software\gator.com\Gator\dyn PdpFirstStart 841:NEW HKEY_LOCAL_MACHINE\software\gator.com\Gator\stat Guid 923D6AE5-0810-4F5C-B555-C849EDB9B805 HKEY_LOCAL_MACHINE\software\gator.com\Gator\stat MID128 HKEY_LOCAL_MACHINE\software\gator.com\Gator\stat MID 569683108 HKEY_LOCAL_MACHINE\software\gator.com\trickles\TRICKLER_6106\Trickler\trickle.gator.com:80/download/trickler6.cfg AccumFile C:\DOCUME~1\MICROS~1\LOCALS~1\Temp\fsg_tmp\tmp\accum\Trickler\GTA0078713D.tmp HKEY_LOCAL_MACHINE\software\gator.com\trickles\TRICKLER_6106\Trickler\trickle.gator.com:80/download/trickler6.cfg UrlSize 4146 HKEY_LOCAL_MACHINE\software\gator.com\trickles\TRICKLER_6106\Trickler\trickle.gator.com:80/download/trickler6.cfg UrlTime Tue, 21 Jun 2005 21:49:56 GMT HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn PdpFirstStart 841:NEW HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat MID128 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-200 1 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_gi 212-bytes 46 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-206 456 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_trickle 212-bytes 3714087 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts StartTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts OldestTime 212 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts 212-200 3 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GCH\_ts 212-bytes 0 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn\GUS _BWHist HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\dyn PdpFirstStart 841:NEW HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat Guid 923D6AE5-0810-4F5C-B555-C849EDB9B805 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat MID128 HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com\Gator\stat MID 569683108 EGroup.InstantAccess Porn Dialer more information... Details: InstantAccess is a dialer that gives a user access to premium services of a third-party Web site, by dialing a high cost numbers using a modem. Status: Ignored Infected files detected c:\program files\instant access\center\hotel heiress.lnk WhenU.Save Adware (General) more information... Details: WhenU.SaveNow is an adware application that displays pop-up advertising on the desktop in response to users' web browsing. Status: Ignored Infected files detected c:\program files\common files\whenu\ucontrolscanandremove.ocx Infected registry entries detected HKEY_CLASSES_ROOT\wusn.1 HKEY_CLASSES_ROOT\wusn.1 WUSN_Id HKEY_CLASSES_ROOT\wuse.1 HKEY_CLASSES_ROOT\wuse.1 WUSE_Id HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\WhenUSaveMsg HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\WhenUSaveMsg SlowInfoCache HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\WhenUSaveMsg Changed 0 AntiLeech Plugin Adware (General) more information... Details: Plugin is an Ad-Ware software which enables the broadcasting of advertisements, and execution of e-commerce and other internet related services on the user-interface of the software. Status: Ignored Infected files detected c:\program files\anti-leech\alie_1.0.1.6\alie.dll c:\program files\anti-leech\alie_1.0.1.6\al2np.dll c:\program files\anti-leech\alie_1.0.1.6\alhlp.exe c:\program files\anti-leech\alie_1.0.1.6\alie.inf c:\program files\anti-leech\alie_1.0.1.6\iesetup2.exe Infected registry entries detected HKEY_CLASSES_ROOT\AntiLeech.ALIE.1 HKEY_CLASSES_ROOT\AntiLeech.ALIE.1\CLSID {056738EE-E15C-11D6-B876-0050BF5D85C7} HKEY_CLASSES_ROOT\AntiLeech.ALIE.1 Anti-Leech Plug-in HKEY_CLASSES_ROOT\AntiLeech.ALIE HKEY_CLASSES_ROOT\AntiLeech.ALIE\CLSID {056738EE-E15C-11D6-B876-0050BF5D85C7} HKEY_CLASSES_ROOT\AntiLeech.ALIE\CurVer AntiLeech.ALIE.1 HKEY_CLASSES_ROOT\AntiLeech.ALIE Anti-Leech Plug-in HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7} HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7}\InprocServer32 C:\PROGRA~1\ANTI-L~1\ALIE_1~1.6\alie.dll HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7}\ProgID AntiLeech.ALIE.1 HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7}\TypeLib {056738E1-E15C-11D6-B876-0050BF5D85C7} HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7}\VersionIndependentProgID AntiLeech.ALIE HKEY_CLASSES_ROOT\CLSID\{056738EE-E15C-11D6-B876-0050BF5D85C7} Anti-Leech Plug-in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Anti-Leech ALIE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Anti-Leech ALIE DisplayName Anti-Leech Plugin for Internet Explorer HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Anti-Leech ALIE UninstallString C:\Program Files\Anti-Leech\ALIE_1.0.1.6\iesetup2.exe uninstall WinShadow Commercial Remote Control Tool more information... Details: WinShadow is a remote desktop tool. Status: Ignored Marketscore.RelevantKnowledge Adware (General) more information... Status: Ignored Infected files detected c:\windows\system32\rlls.dll WhenU.WhenUSearch Low Risk Adware more information... Details: WhenU.WhenUSearch is a desktop search toolbar that displays links to advertised offers in response to users' surfing behavior and opens paid search results when users perform searches through the toolbar's search mechanism. Status: Ignored Infected files detected c:\program files\common files\whenu\ucontrolscanandremove.ocx Infected registry entries detected HKEY_CLASSES_ROOT\WUSE.1 HKEY_CLASSES_ROOT\WUSE.1 WUSE_Id HKEY_CLASSES_ROOT\WUSN.1 HKEY_CLASSES_ROOT\WUSN.1 WUSN_Id HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211} HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211}\ProxyStubClsid {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211}\ProxyStubClsid32 {00020424-0000-0000-C000-000000000046} HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211}\TypeLib {5B061650-38AE-49B4-9F5D-35396B2CEFF5} HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211}\TypeLib Version 1.0 HKEY_CLASSES_ROOT\Interface\{BEAE14DB-A12A-442D-BF77-4644E3661211} UControlScanner Claria.Gator.eWallet Adware (General) more information... Details: Claria's Gator eWallet is an ad supported program that can automatically fill in passwords and other form-elements on Web pages. Status: Ignored Infected files detected c:\windows\gatorgaininstaller.log GimmeWeb Toolbar more information... Details: GimmeWeb is an Internet Explorer toolbar. It displays popup ads depending upon your surfing behavior. Status: Ignored Infected registry entries detected HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN iexplore.exe 1 |
18.09.2006, 01:51 | #7 |
| Trojanisches Pferd "TR/Dldr.Baido" .. und hier der HijackThis-log: (ist das normal, dass die so lang sind???) Logfile of HijackThis v1.99.1 Scan saved at 3:47:13 PM, on 9/15/2006 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\csrss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\System32\Ati2evxx.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Sygate\SPF\smc.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\Rundll32.exe C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe C:\Program Files\Common Files\Real\Update_OB\realsched.exe D:\Program Files\USBToolbox\Res.EXE C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe D:\adobe\Adobe Version Cue CS2\ControlPanel\VersionCueCS2Tray.exe D:\adobe\Adobe Acrobat 7.0\Distillr\Acrotray.exe C:\Program Files\QuickTime\qttask.exe C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Spyware Doctor\swdoctor.exe D:\adobe\Adobe Version Cue CS2\bin\VersionCueCS2.exe C:\Program Files\AntiVir PersonalEdition Classic\sched.exe C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\wdfmgr.exe D:\adobe\Adobe Version Cue CS2\data\database\bin\mysqld-nt.exe C:\WINDOWS\System32\alg.exe C:\WINDOWS\system32\wscntfy.exe C:\WINDOWS\system32\conime.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\WINDOWS\explorer.exe C:\WINDOWS\system32\wuauclt.exe C:\WINDOWS\system32\msiexec.exe C:\Program Files\HiJack This\HijackThis.exe O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - d:\adobe\Adobe Acrobat 7.0\ActiveX\AcroIEHelper.dll O2 - BHO: Anti Fish - {38928D50-8A48-44C2-945F-D2F23F771410} - C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\yangling.dll (file missing) O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll O2 - BHO: IE - {D157330A-9EF3-49F8-9A67-4141AC41ADD4} - C:\WINDOWS\downlo~1\CnsHook.dll O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32 O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe O4 - HKLM\..\Run: [KAVRun] D:\KAV6\KAVRun.EXE O4 - HKLM\..\Run: [Kulansyn] D:\KAV6\Kulansyn.EXE O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot O4 - HKLM\..\Run: [CnsMin] Rundll32.exe C:\WINDOWS\downlo~1\CnsMin.dll,Rundll32 O4 - HKLM\..\Run: [USB Storage Toolbox] d:\Program Files\USBToolbox\Res.EXE O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe O4 - HKLM\..\Run: [RavTimeXP] C:\WINDOWS\Mstray.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe O4 - HKLM\..\Run: [Adobe Version Cue CS2] "D:\adobe\Adobe Version Cue CS2\ControlPanel\VersionCueCS2Tray.exe" O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "d:\adobe\Adobe Acrobat 7.0\Distillr\Acrotray.exe" O4 - HKLM\..\Run: [yassistse] "C:\PROGRA~1\Yahoo!\Assistant\yassistse.exe" O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [EM_EXEC] C:\Program Files\Logitech\MouseWare\SYSTEM\EM_EXEC.EXE O4 - HKLM\..\Run: [avgnt] "C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKLM\..\Run: [SmcService] C:\PROGRA~1\Sygate\SPF\smc.exe -startgui O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet O4 - HKCU\..\Run: [] C:\Program Files\Internet Explorer\SVCHOST1.EXE O4 - HKCU\..\Run: [Spyware Doctor] "C:\Program Files\Spyware Doctor\swdoctor.exe" /Q O4 - Global Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Global Startup: AutoCAD Startup Accelerator.lnk = C:\Program Files\Common Files\Autodesk Shared\acstart16.exe O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = %SystemRoot%\Installer\{AC76BA86-1033-0000-7760-000000000002}\SC_Acrobat.exe O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html O8 - Extra context menu item: Convert link target to Adobe PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html O8 - Extra context menu item: Convert link target to existing PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: Convert selected links to Adobe PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html O8 - Extra context menu item: Convert selected links to existing PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html O8 - Extra context menu item: Convert selection to Adobe PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html O8 - Extra context menu item: Convert selection to existing PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: Convert to Adobe PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html O8 - Extra context menu item: Convert to existing PDF - res://d:\adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html O8 - Extra context menu item: 添加到雅虎订阅(&Y) - res://C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\yrss.dll/YRSSMENUEXT O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll (file missing) O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0521.dll (file missing) O9 - Extra button: Yahoo 1G mail - {507F9113-CD77-4866-BA92-0E86DA3D0B97} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=yahoomail (file missing) O9 - Extra button: E bazar - {59BC54A2-56B3-44a0-93E5-432D58746E26} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=taobao (file missing) O9 - Extra button: Yahoo Assistant - {5D73EE86-05F1-49ed-B850-E423120EC338} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=yassist (file missing) O9 - Extra button: ?e¨|??á??? - {8DE0FCD4-5EB5-11D3-AD25-00002100131B} - url:http://www.joyo.com (file missing) O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O9 - Extra button: ?e¨|??????¨a??? - {e1fc9760-7b95-49cd-80b9-8c9e41017b93} - url:http://www.duba.net (file missing) O9 - Extra button: Instant Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=yahoomsg (file missing) O9 - Extra button: (no name) - {ECF2E268-F28C-48d2-9AB7-8F69C11CCB71} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=repair (file missing) O9 - Extra 'Tools' menuitem: Repair Browser - {ECF2E268-F28C-48d2-9AB7-8F69C11CCB71} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=repair (file missing) O9 - Extra button: ?¨2??2¨|?? - {f58d36c3-40be-4418-a786-d8fbe3eb3554} - D:\KAV6\kavie.htm (file missing) O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing) O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing) O9 - Extra button: (no name) - {FD00D911-7529-4084-9946-A29F1BDF4FE5} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=clean (file missing) O9 - Extra 'Tools' menuitem: Clean Internet access record - {FD00D911-7529-4084-9946-A29F1BDF4FE5} - http://cn.zs.yahoo.com/cnsbutton.htm?source=cns&btn=clean (file missing) O11 - Options group: [!CNS] Chinese keywords O17 - HKLM\System\CCS\Services\Tcpip\..\{73CB8D0D-F345-48F7-8AC9-A8ACC2E0D6B2}: NameServer = 202.106.46.151 202.106.0.20 O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Adobe Version Cue CS2 - Unknown owner - D:\adobe\Adobe Version Cue CS2\bin\VersionCueCS2.exe" -win32service (file missing) O23 - Service: AntiVir PersonalEdition Classic Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\sched.exe O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - AVIRA GmbH - C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Macromedia Licensing Service - Macromedia - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\Program Files\Sygate\SPF\smc.exe |
18.09.2006, 08:33 | #8 |
> MalwareDB | Trojanisches Pferd "TR/Dldr.Baido" Hallo, 1) lade Dir Cleanup und führe es wie beschrieben aus. 2) Jetzt folgende Dateien mittels Killbox(delete on Reboot) löschen: c:\WINDOWS\Downloaded Program Files\CnsMin.dll c:\WINDOWS\Downloaded Program Files\CnsMinIO.dll c:\WINDOWS\Downloaded Program Files\cnsio.dll c:\WINDOWS\Downloaded Program Files\CnsHook.dll c:\windows\system32\cns.dll c:\windows\system32\cns.exe c:\windows\system32\drivers\cnsminkp.sys c:\windows\downloaded program files\keepmain.dll c:\windows\downloaded program files\sms.ico c:\windows\downloaded program files\taobao.ico c:\windows\system32\cns.dat C:\WINDOWS\Downloaded Program Files\zsmod.dll C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\AJ2K4QH2\CnsMinUpM[1].cab C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\AJ2K4QH2\CnsMinExM[1].cab C:\Documents and Settings\Microsoft\Local Settings\Temporary Internet Files\Content.IE5\8L6BOXMV\cnsdtu[1].cab c:\windows\system32\rlls.dll c:\windows\gatorgaininstaller.log c:\program files\instant access (ganzen Ordner) c:\program files\common files\whenu (ganzen Ordner) c:\program files\anti-leech (ganzen Ordner) 3) Systemwiederherstellung abschalten 4) Jetzt den Rechner neu starten, SWH kann wieder angeschaltet werden 5) Lade Dir Regseeker, wähle die Option "clean the registry" lasse scannen und markiere dann die grünen Einträge. Jetzt "Entf" drücken. 6) Führe einen Online Scan durch, poste das Log hier. Gruß Schrulli
__________________ If every computer is running a diverse ecosystem, crackers will have no choice but to resort to small-scale, targetted attacks, and the days of mass-market malware will be over[...]. Stuart Udall Geändert von Schrulli (18.09.2006 um 08:39 Uhr) |
20.09.2006, 02:48 | #9 |
| Trojanisches Pferd "TR/Dldr.Baido" Hallo Schrulli! Ich hab alles so ausgefuehrt, wie du geschrieben hast, bis auf den online-scan. Der braucht den internet-explorer, den ich mir aber sinnigerweise mal deinstalliert hab (glaub ich zumindest), weil ich immer mit mozilla arbeite. Zumindest sagt die site sorry und macht nichts, wenn ich den scan anklicke. Aber ansonsten bringt mir Antivir keine Meldungen mehr, genauso wie Counterspy. Ausserdem kam seit einer Ewigkeit schon nach dem Hochfahren immer eine Fehlermeldung, die jetzt auch nicht mehr angezeigt wird. Also, gebracht hat das alles dementsprechend schon was! Vielen Dank, Hanna |
Themen zu Trojanisches Pferd "TR/Dldr.Baido" |
antivir, aufruf, c:\windows, dateien, erneut, forum, kleine, kleinen, ordner, pferd, quelle, system, system32, trojaner, trojanische, trojanische pferd, trojanisches, trojanisches pferd, verschiedene, versucht, viren, windows, yahoo |